George Loukas

Orcid: 0000-0003-3559-5182

Affiliations:
  • University of Greenwich, UK


According to our database1, George Loukas authored at least 76 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices.
Comput. Secur., 2025

2024
In pursuit of thermal comfort: An exploration of smart heating in everyday life.
Int. J. Hum. Comput. Stud., 2024

A qualitative field study on explainable AI for lay users subjected to AI cyberattacks.
CoRR, 2024

UReum: A Universally Composable Blockchain-Enabled Model for Secure and Privacy-Preserving Data Awareness in Energy Internet.
IEEE Access, 2024

Towards Integration of Syntactic and Semantic Vulnerability Patterns.
Proceedings of the 21st IEEE International Conference on Software Architecture, 2024

2023
User experiences with simulated cyber-physical attacks on smart home IoT.
Pers. Ubiquitous Comput., December, 2023

Forensics for multi-stage cyber incidents: Survey and future directions.
Forensic Sci. Int. Digit. Investig., March, 2023

SoK: The MITRE ATT&CK Framework in Research and Practice.
CoRR, 2023

CROSS: A framework for cyber risk optimisation in smart homes.
Comput. Secur., 2023

Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments.
Comput. Secur., 2023

Towards Behavior-Based Analysis of Android Obfuscated Malware.
Proceedings of the Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium, 2023

Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
On-the-Fly Privacy for Location Histograms.
IEEE Trans. Dependable Secur. Comput., 2022

Information Hygiene: The Fight Against the Misinformation "Infodemic".
IT Prof., 2022

Construction of a Low-Cost Layered Interactive Dashboard with Capacitive Sensing.
Inf., 2022

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles.
IEEE Access, 2022

Optimising user security recommendations for AI-powered smart-homes.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Data-Driven Decision Support for Optimizing Cyber Forensic Investigations.
IEEE Trans. Inf. Forensics Secur., 2021

Self-Configurable Cyber-Physical Intrusion Detection for Smart Homes Using Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Game-Theoretic Decision Support for Cyber Forensic Investigations.
Sensors, 2021

Transformer-based identification of stochastic information cascades in social networks using text and image similarity.
Appl. Soft Comput., 2021

2020
Dynamic decision support for resource offloading in heterogeneous Internet of Things environments.
Simul. Model. Pract. Theory, 2020

Digital Deception: Cyber Fraud and Online Misinformation.
IT Prof., 2020

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature.
Int. J. Distributed Sens. Networks, 2020

How Secure is Home: Assessing Human Susceptibility to IoT Threats.
Proceedings of the PCI 2020: 24th Pan-Hellenic Conference on Informatics, 2020

NeuralPot: An Industrial Honeypot Implementation Based On Deep Neural Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Prototype Deep Learning Paraphrase Identification Service for Discovering Information Cascades in Social Networks.
Proceedings of the 2020 IEEE International Conference on Multimedia & Expo Workshops, 2020

Optimizing Investments in Cyber Hygiene for Protecting Healthcare Users.
Proceedings of the From Lambda Calculus to Cybersecurity Through Program Analysis, 2020

2019
A Secure Occupational Therapy Framework for Monitoring Cancer Patients' Quality of Life.
Sensors, 2019

Toward a Blockchain-Enabled Crowdsourcing Platform.
IT Prof., 2019

A taxonomy and survey of attacks against machine learning.
Comput. Sci. Rev., 2019

A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles.
Ad Hoc Networks, 2019

A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

Participatory location fingerprinting through stationary crowd in a public or commercial indoor environment.
Proceedings of the MobiQuitous 2019, 2019

Blockchain and IoT-based Secure Multimedia Retrieval System for a Massive Crowd: Sharing Economy Perspective.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

A Prototype Framework for Assessing Information Provenance in Decentralised Social Media: The EUNOMIA Concept.
Proceedings of the E-Democracy - Safeguarding Democracy and Human Rights in the Digital Age, 2019

2018
A taxonomy of cyber-physical threats and impact in the smart home.
Comput. Secur., 2018

Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework.
Comput. Secur., 2018

Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications.
IEEE Access, 2018

Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning.
IEEE Access, 2018

On the successful deployment of community policing services the TRILLION project case.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

2017
Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance.
Simul. Model. Pract. Theory, 2017

Location-Enhanced Activity Recognition in Indoor Environments Using Off the Shelf Smart Watch Technology and BLE Beacons.
Sensors, 2017

Assessing the cyber-trustworthiness of human-as-a-sensor reports from mobile devices.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

An eye for deception: A case study in utilizing the human-as-a-security-sensor paradigm to detect zero-day semantic social engineering attacks.
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017

Towards Web Usage Attribution via Graph Community Detection in Grouped Internet Connection Records.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Detecting Cyber-Physical Threats in an Autonomous Robotic Vehicle Using Bayesian Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Impact evaluation and detection of malicious spoofing attacks on BLE based occupancy detection systems.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

2016
Predicting the performance of users as human sensors of security threats in social media.
Int. J. Cyber Situational Aware., 2016

Facilitating forensic examinations of multi-user computer environments through session-to-session analysis of Internet history.
Digit. Investig., 2016

A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks.
ACM Comput. Surv., 2016

You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks.
IEEE Access, 2016

Occupancy Detection for Building Emergency Management Using BLE Beacons.
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016

Evaluating the reliability of users as human sensors of social media security threats.
Proceedings of the 2016 International Conference On Cyber Situational Awareness, 2016

Activity Recognition in a Home Setting Using Off the Shelf Smart Watch Technology.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

Bluetooth Low Energy Based Occupancy Detection for Emergency Management.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

Behaviour-Based Anomaly Detection of Cyber-Physical Attacks on a Robotic Vehicle.
Proceedings of the 15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, 2016

2015
Decision tree-based detection of denial of service and command injection attacks on robotic vehicles.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

Performance Evaluation of Cyber-Physical Intrusion Detection on a Robotic Vehicle.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Strengthening the security of cognitive packet networks.
Int. J. Adv. Intell. Paradigms, 2014

Physical indicators of cyber attacks against a rescue robot.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

2013
A survey of mathematical models, simulation approaches and testbeds used for research in cloud computing.
Simul. Model. Pract. Theory, 2013

A Review of Cyber Threats and Defence Approaches in Emergency Management.
Future Internet, 2013

A taxonomy of cyber attack and defence mechanisms for emergency management networks.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

2012
On the Feasibility of Automated Semantic Attacks in the Cloud.
Proceedings of the Computer and Information Sciences III, 2012

2010
Protection Against Denial of Service Attacks: A Survey.
Comput. J., 2010

2009
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Distributed Defence Against Denial of Service Attacks: A Practical View.
Proceedings of the Visions of Computer Science, 2008

Emergency response simulation using wireless sensor networks.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
A self-aware approach to denial of service defence.
Comput. Networks, 2007

A Denial of Service Detector based on Maximum Likelihood Detection and the Random Neural Network.
Comput. J., 2007

A Biologically Inspired Denial of Service Detector Using the Random Neural Network.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network.
Proceedings of the FUZZ-IEEE 2007, 2007

2006
Defence against denial of service in self-aware networks.
PhD thesis, 2006

2005
An Autonomic Approach to Denial of Service Defence.
Proceedings of the 2005 International Conference on a World of Wireless, 2005


  Loading...